PinnedPublished inGenerative AIBehind the scenes: How investigators identify cybercriminals with nothing but crumbs of evidenceA story about Group-IB‘s Investigations Team persistently piecing together the puzzle of cybercrimeApr 6Apr 6
PinnedThe history of scams, part 3: The global spreadHow scam groups expanded globally, what challenges they faced, and how they adaptedMar 22Mar 22
PinnedPublished inOSINT TeamCyberthreats in 2024: Forecasts for the coming year from Group-IB expertsGroup-IB identifies the top cybersecurity trends for 2024Mar 18Mar 18
PinnedPublished inGenerative AIGroup-IB from the inside: Who we are and how big dreamers become global championsA snap of our culture, values, and traditionsMar 7Mar 7
PinnedCybercrime as a service: 7 real-life examples (with pictures)Subscription services that hackers use to conduct attacksFeb 9Feb 9
The history of scams: Part 2Distinct schemes, roles within scam groups, and scammer subcultureMar 1Mar 1
Published inOSINT TeamAI in the wrong hands: New iOS Trojan challenges face recognitionKey details about the new tool stealing biometric dataFeb 22Feb 22
Goodbye Inferno Drainer?How the scam service stole millions of dollars and why it’s still dangerousJan 18Jan 18
The history of scams: Part 1How petty theft online grew into an organized criminal marketJan 12Jan 12
Protecting against the seasonal spike in ransomware attacks: Lessons from Home AloneWith Christmas already past and the New Year approaching, people around the globe are spending time with their families, watching holiday…Dec 29, 2023Dec 29, 2023